Establish User Level Security in Microsoft Access

Setting up a database's startup options to restrict features, encryption level, and database password are security measures that need to be applied on just about every database and Microsoft Access is no different. This article outlines how to setup user level security, groups, and a workgroup information file within Microsoft Access.

Steps

  1. Start Microsoft Access and open your database
  2. Start the User-Level Security Wizard by clicking on the Tools menu, point to Security, and then click on User-Level Security Wizard.
    • The wizard will immediately ask you to create a workgroup information file. It will create an un-secure backup of the database, and then move to secure the current database. You will need to put in information about the users who will develop and use the database.
  3. Click Next
    • By default, Access will create a unique, 4 to 20 character string at random that is case sensitive, and associates an identity to the workgroup, otherwise referred to as a WID. For security purposes the WID is hidden here.
  4. Ensure that the "I want to create a shortcut to open my secured database" option is selected, before clicking Next.
  5. Click Next
    • The wizard then will ask you what objects in your database do you want to secure. By default, Access will secure all existing database objects and all new objects. You can select objects that will not be secured, meaning ALL users will have full permissions for that object. It's recommended that you don't bypass security for any object within your database.
  6. Click Next
    • Naturally, you don't want everyone to have Admin rights to a database, but you don't want them to have only read permissions. The next screen allows you to include pre-defined groups within your workgroup. If you click on each group (do not put a checkmark beside any yet), you can read a brief description of each group. To make it easier to track, it's recommended that you change the Group ID of any groups you include to something easier to work with.
  7. Click Next, once you have the groups you want.
    • In addition to these available groups, Access creates two other groups, Users and Admins. By default, all database users are added into the Users group. Those users who are in the Admins group have full permissions and are the only users that can create permissions and groups. For this exercise, the "No, the Users group should not have any permissions" option will be selected.
  8. Enter a password and change the personal ID (PID) for the Administrator account before you add any users to your database. NOTE: When entering passwords, they are shown in plain text for all to see.
  9. Click Next
    • Now you will need to assign your users to groups. By default, the Admins group will be present. If specified that the Users group shouldn't have permissions, then the Users group will not be present.
  10. Click Next
  11. Specify the location where you want the unsecured backup to be stored. You will want to remove the .bak file extension and replace it with a .mdb extension. For example: You can store your backup to C:\reunion\backup.mdb
  12. Click Finish.
    • Access will then create the workgroup information file(WID), a secured version of your database, an unsecured version to the location you specified, and a One-Step Security wizard report.
      The One-Step security wizard report lists the name of the secured and unsecured databases, the name and properties the WID, the name of all secured and unsecured objects, group names and properties, and all user information.
      It is recommended that you print a hard copy of the report and place it in a secure location because of the sensitivity of some of the information contained.
      Do not save the report.
  13. The Security Wizard will then tell you that it encrypted the database and that you must exit Access and open the database in the future by using the shortcut on the Windows desktop to the database's WID.

Things You'll Need

  • Microsoft Access
  • A database

Related Articles